{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:04:15Z","timestamp":1725663855276},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540573326"},{"type":"electronic","value":"9783540480662"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/3-540-57332-1_38","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T12:50:14Z","timestamp":1330260614000},"page":"450-459","source":"Crossref","is-referenced-by-count":5,"title":["Two efficient server-aided secret computation protocols based on the addition sequence"],"prefix":"10.1007","author":[{"given":"Chi -Sung","family":"Laih","sequence":"first","affiliation":[]},{"given":"Sung-Ming","family":"Yen","sequence":"additional","affiliation":[]},{"given":"Lein","family":"Harn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,28]]},"reference":[{"key":"38_CR1","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir, and L. Adleman, \u201cA method for obtaining digital signatures and public-key cryptosystem,\u201d Commun. ACM, Vol. 21, pp. 120\u2013126, Feb. 1978.","journal-title":"Commun. ACM"},{"key":"38_CR2","unstructured":"T.Matsumoto and H. Imai, \u201cHow to use servers without releasing Privacy-Making IC cards more powerful,\u201d IEICE Technical Report, Rep. ISEC88-33. (May, 1988)."},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"T.Matsumoto and H. Imai, \u201cSpeeding up secret computations with insecure auxiliary devices,\u201d Proc. of CRYPTO'88, pp.497\u2013506, 1988.","DOI":"10.1007\/0-387-34799-2_35"},{"key":"38_CR4","unstructured":"S. Kawamura and A. Shimbo, \u201cComputation methods for RSA with the aid of powerful terminals,\u201d 1989 Sym.on Cryptography & Inf. Security, Gotemba, Japan (Feb. 2\u20134 1989)."},{"key":"38_CR5","unstructured":"S. Kawamura and A. Shimbo, \u201cA method for computing an RSA signature with the aid of an auxiliary termimal,\u201d 1989 IEICE Autumn Natl. Conv. Rec. A-105."},{"key":"38_CR6","unstructured":"J.J. Quisquater and M. De Soete, \u201cSpeeding up smard card RSA computations with insecure coprocessors,\u201d Proc. SMART CARD 2000. Amsterdam (Oct. 1989)."},{"issue":"No.7","key":"38_CR7","first-page":"1073","volume":"E73","author":"S. Kawamura","year":"1990","unstructured":"S. Kawamura and A. Shimbo, \u201cPerformance analysis of Server-Aided Secret Computation protocols for the RSA cryptosystem,\u201d The Trans. of the IEICE, vol. E73, No. 7, pp. 1073\u20131080, Jul. 1990.","journal-title":"The Trans. of the IEICE"},{"issue":"21","key":"38_CR8","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1049\/el:19820617","volume":"18","author":"J. J. Quisquater","year":"1982","unstructured":"J.J. Quisquater and C. Couvreuer, \u201cFast decipherment algorithm for RSA public-key cryptosystem,\u201d Electron. Lett. 18, 21. pp. 905\u2013907 (Oct. 1982).","journal-title":"Electron. Lett."},{"key":"38_CR9","volume-title":"The art of computer programming, Vol. II: Seminumerical algorithms","author":"D. E. Knuth","year":"1969","unstructured":"D.E. Knuth, The art of computer programming, Vol. II: Seminumerical algorithms. Reading, Addison Wesley, 1969."},{"key":"38_CR10","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1137\/0210047","volume":"3","author":"P. Downey","year":"1981","unstructured":"P. Downey and B. Leony and R. Sethi, \u201cComputing sequences with addition chains,\u201d Siam Journ. Comput. 3 (1981) pp.638\u2013696.","journal-title":"Siam Journ. Comput."},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Andrew Yao, \u201cOn the evaluation of powers,\u201d Siam. J. Comput. 5, (1976).","DOI":"10.1137\/0205008"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT '91"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-57332-1_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:11:38Z","timestamp":1605647498000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-57332-1_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783540573326","9783540480662"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-57332-1_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1993]]}}}